US20110075842A1 - Method and System Making It Possible to Visually Encrypt the Mobile Objects Within A Compressed Video Stream - Google Patents

Method and System Making It Possible to Visually Encrypt the Mobile Objects Within A Compressed Video Stream Download PDF

Info

Publication number
US20110075842A1
US20110075842A1 US12/996,148 US99614809A US2011075842A1 US 20110075842 A1 US20110075842 A1 US 20110075842A1 US 99614809 A US99614809 A US 99614809A US 2011075842 A1 US2011075842 A1 US 2011075842A1
Authority
US
United States
Prior art keywords
objects
stream
image
type
portions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/996,148
Inventor
Cédric Le Barz
Marc Leny
Erwann Renan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales SA
Original Assignee
Thales SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thales SA filed Critical Thales SA
Publication of US20110075842A1 publication Critical patent/US20110075842A1/en
Assigned to THALES reassignment THALES ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LE BARZ, CEDRIC, LENY, MARC, RENAN, ERWANN
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • H04N19/129Scanning of coding units, e.g. zig-zag scan of transform coefficients or flexible macroblock ordering [FMO]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/164Feedback from the receiver or from the transmission channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/169Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding
    • H04N19/17Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/20Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video object coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/50Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding
    • H04N19/503Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using predictive coding involving temporal prediction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/60Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
    • H04N19/61Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding in combination with predictive coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • H04N21/23476Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption by partially encrypting, e.g. encrypting the ending portion of a movie
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/472End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
    • H04N21/4728End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for selecting a Region Of Interest [ROI], e.g. for requesting a higher resolution version of a selected region
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/845Structuring of content, e.g. decomposing content into time segments
    • H04N21/8451Structuring of content, e.g. decomposing content into time segments using Advanced Video Coding [AVC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/845Structuring of content, e.g. decomposing content into time segments
    • H04N21/8456Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/30Compression, e.g. Merkle-Damgard construction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Definitions

  • the invention relates to a method and a system for transmitting a compressed video stream while providing a visual encryption of the moving objects.
  • the method incorporates an encryption step for selected areas in a given image of the compressed stream.
  • the invention is applied for transmitting compressed video streams in a transmission context where the latter are likely to be intercepted and viewed. It is also used to avoid any access to the content of certain protected areas in the image. Thus, any malicious viewing of the screen can be avoided. It in fact makes it possible to protect, for example, the private life of the persons in places equipped with video surveillance, by allowing for a partial or total decoding of the image according to an accreditation level or a particular authorization.
  • the term “foreground” designates the moving object(s) in a video sequence, for example, a pedestrian, a vehicle, a molecule in medical imaging.
  • the designation “background” is used with reference to the environment and to the fixed objects. This corresponds, for example, to the ground, buildings, trees that are not perfectly immobile or even stationary cars. More generally, it is possible in an image to define several areas that are processed differently according to the degree of confidentiality that must be associated therewith.
  • the invention is applied, for example, at the output of a video coder.
  • the invention can, among other things, be applied in applications implementing the standard jointly defined by the ISO, MPEG and the ITU-T video coding group called H.264 or MPEG-4 AVC (advanced video coding) and SVC (scalable video coding) which is a video standard that provides a more effective compression than the previous video standards while offering an implementation complexity that is reasonable and geared toward networked applications.
  • NAL network abstraction layer
  • Video surveillance is increasingly being used, often raising the issue of respect for private life.
  • images or areas of images or video streams must be able to be accessible, the accessibility being associated with authorized people.
  • One of the objects of the present invention is to offer a method of protecting the content of images or of certain areas of an image capable of targeting only the mobile objects within a compressed video stream in order to preserve the integrity of the data and their confidentiality.
  • the invention relates to a method of protecting at least one part of a video stream or of a compressed video sequence against a violation of the information contained in said stream, said stream being able to be broken down into at least one first type of objects and one second type of objects, the method being applied to a selection of images contained in said video sequence, characterized in that it comprises at least the following steps:
  • the invention also relates to a method of protecting a video stream compressed with an H.264 standard, characterized in that it includes, during the step c), at least the following steps:
  • the first group of objects corresponds, for example, to a foreground comprising moving objects in an image.
  • It uses, for example, an encryption method that makes it possible to modify, within slice groups corresponding to the foreground, the bits that will allow a total decoding in the event of use of the encryption or ciphering key.
  • the method uses, for example, a function suitable for determining a mask for identifying blocks of an image or group of images comprising one or more mobile objects defined as one or more regions of the mask and the other blocks belonging to the background following an analysis in the compressed domain.
  • the method for defining the portions or “slice groups” uses, for example, the flexible microbloc ordering or FMO technique allowing for the definition of the slice groups macrobloc by macrobloc.
  • the invention also relates to a system that makes it possible to visually encrypt a video sequence, characterized in that it comprises at least one video processing unit suitable for executing the steps of the method described previously comprising at least the following elements:
  • FIGS. 1 to 4 the results obtained by an analysis in the compressed domain
  • FIG. 5 an example describing the steps implemented to add a visual encryption to the compressed stream
  • FIG. 6 an exemplary diagram for a video unit according to the invention.
  • the techniques used among other things in the MPEG standards and explained in these articles consist in dividing the video compression into two steps.
  • the first step aims to compress a fixed image.
  • the image is divided into blocks of pixels (4 ⁇ 4 or 8 ⁇ 8 according to the MPEG-1/2/4 standards), which then undergo a transformation allowing for a transition to the frequency domain, then a quantization makes it possible to approximate or eliminate the high frequencies to which the eye is less sensitive.
  • these quantized data are entropically encoded.
  • the objective of the second step is to reduce time redundancy. To this end, it can be used to predict an image on the basis of one or more other images previously decoded within the same sequence (motion prediction). For this, the process searches in these reference images for the block that best corresponds to the desired prediction. Only a vector (motion estimation vector, or motion vector), corresponding to the movement of the block between the two images, and a residual error that can be used to refine the visual rendition are retained.
  • a low resolution decoder (LRD) is used to reconstruct all of a sequence at the resolution of the block, eliminating at this scale the motion prediction; 2) a motion estimation generator (MEG) determines vectors for all the blocks that the coder has coded in “intra” mode (within intra or predicted images); 3) a low-resolution object segmentation module (LROS) is, for its part, based on an estimation of the background in the compressed domain by virtue of the sequences reconstructed by the LRD and therefore gives a first estimation of the mobile objects; 4) the filtering of objects based on motion (OMF—Object Motion Filtering) uses the vectors output from the MEG to determine the mobile areas based on the motion estimation; 5) finally, a cooperative decision module (CD) can be used to establish the final result from these two segmentations, taking into account the specifics of each module according to the type of image analyzed (intra or predicted).
  • MEG motion estimation generator
  • the main benefit of analysis in the compressed domain relates to the computation times and the memory requirements which are considerably reduced compared to the conventional analysis tools.
  • the analysis times are now 10 to 20 times real time (250 to 500 images processed per second) for 4:2:0 720 ⁇ 576 images
  • FIG. 2 The results obtained by analysis in the compressed domain are illustrated by FIG. 2 , the results showing the identification of areas containing mobile objects.
  • FIG. 3 diagrammatically represents the extraction of specific data such as the motion estimation vectors and FIG. 4 low-resolution confidence maps obtained that correspond to the contours of the image.
  • FIG. 5 diagrammatically represents an exemplary implementation of the method according to the invention during which areas of an image contained in a compressed video stream will be visually encrypted.
  • This step performed by encryption of certain bits by using, for example, the method described in the abovementioned article by Bergeron et al, will be executed on the compressed video stream.
  • Certain areas in the image that have a higher level of confidentiality will be selected and be encrypted so as to avoid direct access to the data that they contain.
  • the compressed video stream 1 at the output of a coder is transmitted to a first analysis step 2 , the function of which is to identify the mobile objects.
  • the method generates a sequence of masks comprising regions that have received an identical label, or blocks linked to the mobile objects.
  • This analysis in the compressed domain has made it possible to define for each image or for a defined group of images GoP, on the one hand different areas Z 1 i belonging to the foreground P 1 and other areas Z 2 i belonging to the background P 2 of a video image.
  • the analysis can be done by implementing the method described in the abovementioned US patent application.
  • any method that makes it possible to obtain an output from the analysis step in the form of masks for each image, or any other format or parameters associated with the analyzed compressed video sequence can also be implemented instead of the proposed analysis step in the compressed domain.
  • the method has, for example, binary masks for each image (block or macrobloc resolution).
  • An exemplary convention used may be as follows: “1” corresponds to a block of the image belonging to the foreground and “0” corresponds to a block of the image belonging to the background. From these masks, the groups of portions of the image, better known as “slice groups”, which comprise one or more blocks identified as belonging to the foreground are selected with a view to the encryption step. This corresponds to step 2 in FIG. 5 , the results being the identified slice groups ( 3 a and 3 b ). The image is thus segmented according to its semantic content.
  • the coordinates of surrounding boxes correspond to the mobile objects and are computed using the mask. These boxes can be defined by two extreme points, by a central point associated with the dimension of the box, and so on. There may also be a set of coordinates for each image or a set for all of the sequence with trajectory information (date and point of entry, curve described, date and point of exit). A search will then be made for the slices of the image that are at least partially covered by one of the surrounding boxes corresponding to the foreground.
  • the masks may be binary masks.
  • the method processes, 5 a and 5 b , the areas of the image that include these mobile objects in order to visually encrypt them by means of an encryption key for example.
  • the encrypted and unencrypted parts are then merged, 6 .
  • Information indicating the parts of the stream that have been encrypted are added so as to differentiate them in the decoder. This addition is made by using techniques known to those skilled in the art.
  • the encryption or ciphering step applies, to the slice groups identified in the step 2 , the method described in the article by Bergeron et al or in the patent application WO 2006/067172.
  • the visual encryption can be done directly within the compressed stream without involving steps other than the stream interpretation step, or parsing step, which is already performed prior to the analysis in the compressed domain. This makes it possible to obtain results with very low computation time and memory resources.
  • an NAL of undefined type 30 or 31 within which it is possible to transmit any type of information, will receive the identification of the groups of portions that have been visually encrypted. Unlike the other NAL types, the NALs 30 and 31 are not reserved, whether for the stream itself or the RTP-RTSP-type network protocols. A standard decoder will simply discard this information whereas a specific decoder, developed to take account of this type of NALs, can choose to use this information to detect and possibly decrypt the protected areas.
  • the two buffer memories 4 , 5 b containing the encrypted and unencrypted parts of the streams are then merged, accompanied by the determined NALs, to reconstruct a single stream 6 which is now visually partially encrypted.
  • the encryption method used preserves the structure of the stream from the various headers to the possibility of decoding the data via the variable length coding (VLC) present in the H.264 standard.
  • VLC variable length coding
  • a conventional decoder will therefore consider a stream to be normal, without encryption features, and therefore supply a decoded sequence having a part of the image without specifics (by default, the background) and another part encrypted (the groups of portions or “slices” comprising the mobile objects).
  • a specific decoder will identify the “undefined NAL” comprising the identification of the groups of portions that have been encrypted.
  • the decryption key will allow for a viewing of the sequence that is totally intelligible.
  • This method is implemented within a video processing unit schematically represented in FIG. 6 .
  • the processing unit 10 comprises a tool for detecting portions of the video stream or of the image to be encrypted 11 suitable for determining various areas of interest of the image, that is to say, the areas of the image that must be encrypted.
  • the unit 10 includes a module 13 for encrypting the identified portions, and a buffer memory 12 which receives the part of the encrypted stream together with the unencrypted other parts of the stream in a partially encrypted stream and another module 14 that makes it possible to merge the two parts of the stream, the encrypted and compressed part and the unencrypted and compressed part.
  • the invention therefore allows for more than a simple juxtaposition of functions processing a video stream in series: feedback loops are possible and all the redundant steps between the modules involved are no longer present only once.
  • Breakdown into portions and groups of portions is not managed by the method, which must apply the proposed processing operations to the partition of the image that exists within the compressed video stream 1 .
  • the results may vary depending on the type of standard and coder used when compressing the sequence. If the image is, for example, simply vertically divided into three portions, the method will then encrypt one, two or even three thirds of the image. Although the method works in this case, the results resulting therefrom are of little interest.
  • the results correspond to an encryption of only the mobile objects, even allowing for an identification of the type of object by its shape and contour (car, pedestrian, etc.).
  • a video stream that has a structure as described in the applicant's patent application filed on the same day as the present application and entitled “Construction d'unemorph structure image s'clientant sur des objects sémantics au strig d'un flux video compressé et le omb associé” (Construction of a new image structure based on semantic objects within a compressed video stream and associated device) makes it possible to obtain optimal results.
  • the independent reconstruction of the objects then ensures a visual encryption closest to the object, impacting on the intelligibility of the rest of the scene.
  • This operation can also be effected in parallel with a target bit rate order for the mobile objects in the sequence. It will then be possible to add robustness to the errors (which increases the bit rates) coupled to an adaptation to a target bit rate by on-the-fly optimization on the already compressed stream. This coupling will make it possible, for example, to maintain a fixed bit rate while protecting the content linked to the foreground.

Abstract

A method and system is provided of protecting at least one part of a video stream or of a compressed video sequence against a violation of the information contained in said stream, said stream being able to be broken down into at least one first type of objects and one second type of objects, the method being applied to a selection of images contained in said video sequence, characterized in that it comprises at least the following steps: analyzing the video sequence in the compressed domain so as to define for a given image N at least one first type of objects to be protected by encryption and one second type of objects, the analysis module which identifies the portions of the image belonging to the first type of objects to be protected sends the motion estimation vectors and the transformed coefficients to the encryption step; determining, according to the breakdown into portions or into groups of portions of the existing image N, those corresponding respectively to the first type of objects to be protected and to the other types; encrypting at least a part of the first type of objects; reconstructing, on the basis of the outputs of the preceding steps, a stream consisting of at least one first type of encrypted objects and other types of objects, to which is added information indicating which objects are the ones that have been encrypted.

Description

  • The invention relates to a method and a system for transmitting a compressed video stream while providing a visual encryption of the moving objects. The method incorporates an encryption step for selected areas in a given image of the compressed stream. The invention is applied for transmitting compressed video streams in a transmission context where the latter are likely to be intercepted and viewed. It is also used to avoid any access to the content of certain protected areas in the image. Thus, any malicious viewing of the screen can be avoided. It in fact makes it possible to protect, for example, the private life of the persons in places equipped with video surveillance, by allowing for a partial or total decoding of the image according to an accreditation level or a particular authorization.
  • Hereinafter in the description, the term “foreground” designates the moving object(s) in a video sequence, for example, a pedestrian, a vehicle, a molecule in medical imaging. On the other hand, the designation “background” is used with reference to the environment and to the fixed objects. This corresponds, for example, to the ground, buildings, trees that are not perfectly immobile or even stationary cars. More generally, it is possible in an image to define several areas that are processed differently according to the degree of confidentiality that must be associated therewith.
  • The words encryption or ciphering are used interchangeably.
  • The invention is applied, for example, at the output of a video coder. The invention can, among other things, be applied in applications implementing the standard jointly defined by the ISO, MPEG and the ITU-T video coding group called H.264 or MPEG-4 AVC (advanced video coding) and SVC (scalable video coding) which is a video standard that provides a more effective compression than the previous video standards while offering an implementation complexity that is reasonable and geared toward networked applications.
  • Hereinafter in the description, the applicant uses the expression “compressed stream” or “compressed video sequence” to designate one and the same object.
  • The expression “slices” or “portions”, better known in the field by the expression “slices”, corresponds to a subpart of the image consisting of macroblocs which belong to one and the same set defined by the user. These terms are well known to those skilled in the art in the field of compression, for example, in the MPEG standards.
  • The concept of network abstraction layer, or NAL, used hereinafter in the description exists in the H.264 standard. It is a network transport unit which can contain either a portion or “slice” for the VCL (video coding layer) NALs, or a data packet (set of parameters known to those skilled in the art—SPS, PPS-, user data, etc.) for the non-VCL NALs.
  • Video surveillance is increasingly being used, often raising the issue of respect for private life. In some applications, only images or areas of images or video streams must be able to be accessible, the accessibility being associated with authorized people.
  • The publication entitled Compliant Selective encryption for H.264/AVC video streams by Cyril Bergeron and Catherine Lamy (Proceedings of the International Workshop on Multimedia Processing, MMSP'05, Shangai) discloses a method that makes it possible to encrypt a video stream so as to secure the transmission of the information contained in this stream while preserving compatibility with the H.264 standard. If only a few bits within the stream are modified to obtain this result, the video sequence produced is visually totally encrypted, and cannot be viewed without a decoding key.
  • One of the objects of the present invention is to offer a method of protecting the content of images or of certain areas of an image capable of targeting only the mobile objects within a compressed video stream in order to preserve the integrity of the data and their confidentiality.
  • The invention relates to a method of protecting at least one part of a video stream or of a compressed video sequence against a violation of the information contained in said stream, said stream being able to be broken down into at least one first type of objects and one second type of objects, the method being applied to a selection of images contained in said video sequence, characterized in that it comprises at least the following steps:
      • a) analyzing the video sequence in the compressed domain so as to define for a given image N at least one first type of objects to be protected by encryption and a second type of objects,
      • b) determining, according to the breakdown into portions or into groups of portions of the existing image N, those corresponding respectively to the first type of objects to be protected and to the other types,
      • c) encrypting at least a part of the first type of objects, and
      • d) reconstructing, on the basis of the outputs of the preceding steps, a stream consisting of at least one first type of encrypted objects, and of other types of objects, to which is added information indicating which objects are the ones that have been encrypted.
  • The invention also relates to a method of protecting a video stream compressed with an H.264 standard, characterized in that it includes, during the step c), at least the following steps:
      • analyzing the video stream in the compressed domain,
      • defining at least one first group of objects containing areas or objects to be encrypted in said stream, and identifying the portions of the image containing them,
      • encrypting the portions identified by the preceding step,
      • for a given image or a given group of images, creating a network transport unit of “undefined NAL” type, which will convey the identification of the encrypted image portions,
      • reconstructing a single compressed stream comprising encrypted and unencrypted areas, and the new NAL units identifying the image portions that have been encrypted.
  • The first group of objects corresponds, for example, to a foreground comprising moving objects in an image.
  • It may use an encryption method that makes it possible to modify, within slice groups corresponding to the foreground, the bits that allow for decoding with a standard decoder.
  • It uses, for example, an encryption method that makes it possible to modify, within slice groups corresponding to the foreground, the bits that will allow a total decoding in the event of use of the encryption or ciphering key.
  • The method uses, for example, a function suitable for determining a mask for identifying blocks of an image or group of images comprising one or more mobile objects defined as one or more regions of the mask and the other blocks belonging to the background following an analysis in the compressed domain.
  • The video sequence being produced by an MPEG-4 part 10/H.264 standard, the method for defining the portions or “slice groups” uses, for example, the flexible microbloc ordering or FMO technique allowing for the definition of the slice groups macrobloc by macrobloc.
  • The invention also relates to a system that makes it possible to visually encrypt a video sequence, characterized in that it comprises at least one video processing unit suitable for executing the steps of the method described previously comprising at least the following elements:
      • a means suitable for identifying the portions of the video sequence that will be encrypted,
      • a module for encrypting the identified portions,
      • a buffer memory which receives the other parts of the stream that are not encrypted,
      • a module suitable for merging the part of the compressed encrypted stream and the part of the unencrypted and compressed stream,
      • said identification and visual encryption modules communicating with one another.
  • Other features and advantages of the device according to the invention will become more apparent from reading the following description of an exemplary embodiment given as an illustrative and non-limiting example, with appended figures which represent:
  • FIGS. 1 to 4, the results obtained by an analysis in the compressed domain,
  • FIG. 5, an example describing the steps implemented to add a visual encryption to the compressed stream, and
  • FIG. 6, an exemplary diagram for a video unit according to the invention.
  • In order to better understand the operation of the method according to the invention, the description includes a review of how to perform an analysis in the compressed domain, as is described for example in patent application US 2006 188013 with reference to FIGS. 1, 2, 3 and 4 and also in the following two references:
      • Leny, Nicholson, Prêteux, “De l'estimation de mouvement pour l'analyse temps réel de vidéos dans le domaine compressé”, GRETSI, 2007.
      • Leny, Prêteux, Nicholson, “Statistical motion vector analysis for object tracking in compressed video streams”, SPIE Electronic Imaging, San Jose, 2008.
  • To sum up, the techniques used among other things in the MPEG standards and explained in these articles consist in dividing the video compression into two steps. The first step aims to compress a fixed image. The image is divided into blocks of pixels (4×4 or 8×8 according to the MPEG-1/2/4 standards), which then undergo a transformation allowing for a transition to the frequency domain, then a quantization makes it possible to approximate or eliminate the high frequencies to which the eye is less sensitive. Finally, these quantized data are entropically encoded. The objective of the second step is to reduce time redundancy. To this end, it can be used to predict an image on the basis of one or more other images previously decoded within the same sequence (motion prediction). For this, the process searches in these reference images for the block that best corresponds to the desired prediction. Only a vector (motion estimation vector, or motion vector), corresponding to the movement of the block between the two images, and a residual error that can be used to refine the visual rendition are retained.
  • These vectors do not, however, necessarily correspond to an actual motion of an object in the video sequence but may be like noise. Various steps are therefore needed to use such information in order to identify the mobile objects. The works described in the abovementioned publication Leny et al, “De l'estimation de mouvement pour l'analyse temps reél de vidéos dans le domaine compressé”, and in the abovementioned US patent application, have made it possible to delimit five functions making analysis in the compressed domain possible, these functions and the implementation means corresponding to them being represented in FIG. 1:
  • 1) a low resolution decoder (LRD) is used to reconstruct all of a sequence at the resolution of the block, eliminating at this scale the motion prediction;
    2) a motion estimation generator (MEG) determines vectors for all the blocks that the coder has coded in “intra” mode (within intra or predicted images);
    3) a low-resolution object segmentation module (LROS) is, for its part, based on an estimation of the background in the compressed domain by virtue of the sequences reconstructed by the LRD and therefore gives a first estimation of the mobile objects;
    4) the filtering of objects based on motion (OMF—Object Motion Filtering) uses the vectors output from the MEG to determine the mobile areas based on the motion estimation;
    5) finally, a cooperative decision module (CD) can be used to establish the final result from these two segmentations, taking into account the specifics of each module according to the type of image analyzed (intra or predicted).
  • The main benefit of analysis in the compressed domain relates to the computation times and the memory requirements which are considerably reduced compared to the conventional analysis tools. By relying on the work performed at the time of video compression, the analysis times are now 10 to 20 times real time (250 to 500 images processed per second) for 4:2:0 720×576 images
  • One of the drawbacks in analysis in the compressed domain as described in the abovementioned documents is that the work is carried out on the equivalent of low-resolution images by manipulating blocks consisting of groups of pixels. The result is that the image is analyzed with less accuracy than by implementing the usual algorithms used in the uncompressed domain. Furthermore, those objects that are too small in relation to the breakdown into blocks may go unnoticed.
  • The results obtained by analysis in the compressed domain are illustrated by FIG. 2, the results showing the identification of areas containing mobile objects. FIG. 3 diagrammatically represents the extraction of specific data such as the motion estimation vectors and FIG. 4 low-resolution confidence maps obtained that correspond to the contours of the image.
  • FIG. 5 diagrammatically represents an exemplary implementation of the method according to the invention during which areas of an image contained in a compressed video stream will be visually encrypted. This step, performed by encryption of certain bits by using, for example, the method described in the abovementioned article by Bergeron et al, will be executed on the compressed video stream. Certain areas in the image that have a higher level of confidentiality will be selected and be encrypted so as to avoid direct access to the data that they contain.
  • The compressed video stream 1 at the output of a coder is transmitted to a first analysis step 2, the function of which is to identify the mobile objects. Thus, the method generates a sequence of masks comprising regions that have received an identical label, or blocks linked to the mobile objects.
  • This analysis in the compressed domain has made it possible to define for each image or for a defined group of images GoP, on the one hand different areas Z1 i belonging to the foreground P1 and other areas Z2 i belonging to the background P2 of a video image. The analysis can be done by implementing the method described in the abovementioned US patent application. However, any method that makes it possible to obtain an output from the analysis step in the form of masks for each image, or any other format or parameters associated with the analyzed compressed video sequence can also be implemented instead of the proposed analysis step in the compressed domain. On completion of the analysis step, the method has, for example, binary masks for each image (block or macrobloc resolution). An exemplary convention used may be as follows: “1” corresponds to a block of the image belonging to the foreground and “0” corresponds to a block of the image belonging to the background. From these masks, the groups of portions of the image, better known as “slice groups”, which comprise one or more blocks identified as belonging to the foreground are selected with a view to the encryption step. This corresponds to step 2 in FIG. 5, the results being the identified slice groups (3 a and 3 b). The image is thus segmented according to its semantic content.
  • In a more general application context, it will be possible to define not two areas, but several types of objects which will give rise to a visual encryption application according to their importance and their sensitivity, for example by the use of different keys.
  • According to a variant implementation as indicated previously, it is also possible to process the boxes surrounding mobile objects. The coordinates of surrounding boxes correspond to the mobile objects and are computed using the mask. These boxes can be defined by two extreme points, by a central point associated with the dimension of the box, and so on. There may also be a set of coordinates for each image or a set for all of the sequence with trajectory information (date and point of entry, curve described, date and point of exit). A search will then be made for the slices of the image that are at least partially covered by one of the surrounding boxes corresponding to the foreground. The masks may be binary masks.
  • The portions of the image 3 a that do not require visual ciphering or encryption are simply copied into the temporary buffer memory 4.
  • On the other hand, the method processes, 5 a and 5 b, the areas of the image that include these mobile objects in order to visually encrypt them by means of an encryption key for example. The encrypted and unencrypted parts are then merged, 6. Information indicating the parts of the stream that have been encrypted are added so as to differentiate them in the decoder. This addition is made by using techniques known to those skilled in the art. In this exemplary implementation, the encryption or ciphering step applies, to the slice groups identified in the step 2, the method described in the article by Bergeron et al or in the patent application WO 2006/067172. Since the latter is designed to encrypt the data of a compressed stream, the visual encryption can be done directly within the compressed stream without involving steps other than the stream interpretation step, or parsing step, which is already performed prior to the analysis in the compressed domain. This makes it possible to obtain results with very low computation time and memory resources.
  • In the case of the H.264 standard, an NAL, of undefined type 30 or 31 within which it is possible to transmit any type of information, will receive the identification of the groups of portions that have been visually encrypted. Unlike the other NAL types, the NALs 30 and 31 are not reserved, whether for the stream itself or the RTP-RTSP-type network protocols. A standard decoder will simply discard this information whereas a specific decoder, developed to take account of this type of NALs, can choose to use this information to detect and possibly decrypt the protected areas.
  • In the case of a stream that has been encoded according to recommendations present in the applicant's patent application filed on the same day and entitled “Construction d'une nouvelle structure image s'appuyant sur des objets sémantiques au sein d'un flux vidêo compressé et le dispositif associé” (Construction of a new image structure based on semantic objects within a compressed video stream and associated device), the nature of the objects or groups of objects (encrypted or not) may be directly included in the corresponding header. This new structure relies on a hierarchical organization of the image into: image, image group or images, portions or “slices”.
  • The two buffer memories 4, 5 b containing the encrypted and unencrypted parts of the streams are then merged, accompanied by the determined NALs, to reconstruct a single stream 6 which is now visually partially encrypted.
  • It should be noted that the encryption method used preserves the structure of the stream from the various headers to the possibility of decoding the data via the variable length coding (VLC) present in the H.264 standard. Thus, a conventional decoder will therefore consider a stream to be normal, without encryption features, and therefore supply a decoded sequence having a part of the image without specifics (by default, the background) and another part encrypted (the groups of portions or “slices” comprising the mobile objects). By comparison, a specific decoder will identify the “undefined NAL” comprising the identification of the groups of portions that have been encrypted. The decryption key will allow for a viewing of the sequence that is totally intelligible. This makes it possible, for example, in the context of video surveillance, to transmit the encrypted stream to the guard post where security operatives can identify the presence of a person, of a car, of a truck, etc., through silhouettes, without being able to directly identify the face of the person or the registration plate of the vehicle, which can be viewed by a security manager, police services, etc. This characteristic allows for a wider distribution of the surveillance streams while respecting constraints associated with private life.
  • This method is implemented within a video processing unit schematically represented in FIG. 6.
  • The processing unit 10 comprises a tool for detecting portions of the video stream or of the image to be encrypted 11 suitable for determining various areas of interest of the image, that is to say, the areas of the image that must be encrypted. The unit 10 includes a module 13 for encrypting the identified portions, and a buffer memory 12 which receives the part of the encrypted stream together with the unencrypted other parts of the stream in a partially encrypted stream and another module 14 that makes it possible to merge the two parts of the stream, the encrypted and compressed part and the unencrypted and compressed part.
  • Two apparently independent main steps constitute the present invention: analysis and visual encryption. Physically, these various modules can communicate with one another to optimize all of the processing chain:
      • For the analysis in the compressed domain, it is necessary to deencapsulate the stream, to format the data (parse it) and finally to perform an entropic decoding. The motion estimation vectors and the transformed coefficients are thus obtained. These modules are also necessary for the encryption but will not have to be reiterated.
      • The analysis module which identifies the portions of the image that belong to the regions of interest sends these parameters to the encryption block accompanied by the previously obtained data.
      • For the actual visual encryption part, once again the transformed coefficients and motion estimation vectors are necessary. The proposed method here makes it possible also to do away with the deencapsulation and entropic decoding step since the information circulates from module to module.
      • Once these steps are processed, only the new entropic encoding (which may physically commence during encryption) and the encapsulation of the stream then take place.
  • The invention therefore allows for more than a simple juxtaposition of functions processing a video stream in series: feedback loops are possible and all the redundant steps between the modules involved are no longer present only once.
  • Breakdown into portions and groups of portions is not managed by the method, which must apply the proposed processing operations to the partition of the image that exists within the compressed video stream 1. Then, the results may vary depending on the type of standard and coder used when compressing the sequence. If the image is, for example, simply vertically divided into three portions, the method will then encrypt one, two or even three thirds of the image. Although the method works in this case, the results resulting therefrom are of little interest. On the other hand, with an encoder implementing H.264 within which a slice group is assigned to each mobile object, the results correspond to an encryption of only the mobile objects, even allowing for an identification of the type of object by its shape and contour (car, pedestrian, etc.). For example, a video stream that has a structure as described in the applicant's patent application filed on the same day as the present application and entitled “Construction d'une nouvelle structure image s'appuyant sur des objets sémantiques au sein d'un flux video compressé et le dispositif associé” (Construction of a new image structure based on semantic objects within a compressed video stream and associated device) makes it possible to obtain optimal results. The independent reconstruction of the objects then ensures a visual encryption closest to the object, impacting on the intelligibility of the rest of the scene.
  • Without departing from the context of the invention, other techniques will make it possible to encrypt areas in an image in order to ensure that the confidentiality of the information that they contain may be used, provided that they do not compromise the fact that the stream may be decoded by an implantation according to the standard concerned.
  • This operation can also be effected in parallel with a target bit rate order for the mobile objects in the sequence. It will then be possible to add robustness to the errors (which increases the bit rates) coupled to an adaptation to a target bit rate by on-the-fly optimization on the already compressed stream. This coupling will make it possible, for example, to maintain a fixed bit rate while protecting the content linked to the foreground.

Claims (11)

1. A method of protecting at least one part of a video stream or of a compressed video sequence against a violation of the information contained in said video stream or in said compressed video sequence, said video stream or said compressed video sequence being able to be broken down into at least one first type of objects and one second type of objects, the method being applied to a selection of images contained in said video sequence, comprising at least the following steps:
a) analyzing the video sequence in the compressed domain so as to define for a given image N at least one first type of objects to be protected by encryption and a second type of objects, said analysis module identifies the portions of the image belonging to the first type of objects to be protected, and extracts from the video stream, the motion estimation vectors and the transformed coefficients associated with the first type of objects and transmits said parameters to the step c),
b) determining, according to the breakdown resulting from the analysis into portions or into groups of portions of the existing image N, those corresponding respectively to the first type of objects to be protected and to the other types,
c) encrypting at least a part of the first type of objects by encrypting the motion estimation vectors and the transformed coefficients, and
d) reconstructing, on the basis of the outputs of the preceding steps, a stream consisting of at least one first type of encrypted objects and of other types of objects, to which are added information indicating which objects are the ones that have been encrypted.
2. The method as claimed in claim 1 for a stream compressed with an H.264 standard, further comprising, during the step c, at least the following steps:
analyzing the video stream in the compressed domain,
defining at least one first group of objects containing areas or objects to be encrypted in said stream, and identifying the portions of the image containing them,
encrypting the portions identified by the preceding step,
for a given image or a given group of images, creating a network transport unit of “undefined NAL” type, which will convey the identification of the encrypted image portions,
reconstructing a single compressed stream comprising encrypted and unencrypted areas, and the new NAL units identifying the image portions that have been encrypted.
3. The method as claimed in claim 1, wherein the first group of objects corresponds to a foreground comprising moving objects in an image.
4. The method as claimed in claim 3, wherein it uses an encryption method that makes it possible to modify, within slice groups corresponding to the foreground, the bits that allow for decoding with a standard decoder.
5. The method as claimed in claim 4, wherein it uses an encryption method that makes it possible to modify, within slice groups corresponding to the foreground, the bits that will allow the total decoding in the event of use of the encryption or ciphering key.
6. The method as claimed in claim 1, wherein it uses a function suitable for determining a mass for identifying blocks of an image or group of images comprising one or more mobile objects defined as one or more regions of the mask and the other blocks belonging to the background following an analysis in the compressed domain.
7. The method as claimed in claim 1, wherein, the video sequence being produced by an MPEG-4 part 10/H.264 standard, the method for defining the portions or “slice groups” uses the flexible macrobloc ordering or FMO technique allowing for the definition of the slide groups macrobloc by macrobloc.
8. A system that makes it possible to visually encrypt a video sequence, comprising at least one video processing unit suitable for executing the steps of the method as claimed in claim 1 and further comprising at least the following elements:
a means suitable for identifying the portions of the video sequence that will be encrypted,
a module for encrypting the identified portions,
a buffer memory which receives the other parts of the stream that are not encrypted,
a module suitable for merging the part of the compressed encrypted stream and the part of the unencrypted and compressed stream,
said identification and visual encryption modules communicating with one another.
9. The method as claimed in claim 2 wherein the first group of objects corresponds to a foreground comprising moving objects in an image.
10. The method as claimed in claim 2 wherein it uses a function suitable for identifying blocks of an image or group of images comprising one or more mobile objects defined as one for more mobile objects defined as one or more regions of the mask and the other blocks belonging to the background following an analysis in the compressed domain
11. A system that makes it possible to visually encrypt a video sequence, comprising at least one video processing unit suitable for executing the steps of the method as claim in claim 2.
US12/996,148 2008-06-03 2009-06-03 Method and System Making It Possible to Visually Encrypt the Mobile Objects Within A Compressed Video Stream Abandoned US20110075842A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR0803063A FR2932046B1 (en) 2008-06-03 2008-06-03 METHOD AND SYSTEM FOR VISUALLY CRYPTING MOBILE OBJECTS WITHIN A COMPRESSED VIDEO STREAM
FR0803063 2008-06-03
PCT/EP2009/056830 WO2009147183A1 (en) 2008-06-03 2009-06-03 Method and system making it possible to visually encrypt the mobile objects within a compressed video stream

Publications (1)

Publication Number Publication Date
US20110075842A1 true US20110075842A1 (en) 2011-03-31

Family

ID=40227830

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/996,148 Abandoned US20110075842A1 (en) 2008-06-03 2009-06-03 Method and System Making It Possible to Visually Encrypt the Mobile Objects Within A Compressed Video Stream

Country Status (7)

Country Link
US (1) US20110075842A1 (en)
EP (1) EP2297951A1 (en)
BR (1) BRPI0913390A2 (en)
FR (1) FR2932046B1 (en)
MA (1) MA32377B1 (en)
MX (1) MX2010013317A (en)
WO (1) WO2009147183A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100057906A1 (en) * 2001-01-03 2010-03-04 Portauthority Technologies, Inc. Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks
EP2874396A1 (en) * 2013-11-15 2015-05-20 Everseen Ltd. Method and system for securing a stream of data
US20160188980A1 (en) * 2014-12-30 2016-06-30 Morphotrust Usa, Llc Video Triggered Analyses
US20160198207A1 (en) * 2013-07-22 2016-07-07 Sony Corporation Information processing apparatus and method
KR20170004501A (en) * 2015-07-02 2017-01-11 삼성전자주식회사 Method and apparatus for multimedia data encryption and decryption
KR20170084601A (en) * 2016-01-12 2017-07-20 한화테크윈 주식회사 Apparatus and method for encrypting privacy areas from compressed video
US20190116163A1 (en) * 2013-07-29 2019-04-18 Mobitv, Inc. Efficient common storage of partially encrypted content
CN110446105A (en) * 2019-09-20 2019-11-12 网易(杭州)网络有限公司 Video-encryption, decryption method and device
US10638142B2 (en) * 2015-04-30 2020-04-28 Hangzhou Hikvision Digital Technology Co., Ltd. Video coding and decoding methods and apparatus
US11115194B2 (en) * 2018-08-08 2021-09-07 Shandong University Of Science And Technology Gray image visual encryption method
US11159798B2 (en) * 2018-08-21 2021-10-26 International Business Machines Corporation Video compression using cognitive semantics object analysis
CN114143410A (en) * 2021-11-16 2022-03-04 国网江苏省电力有限公司信息通信分公司 Power monitoring image encryption transmission method based on Internet of things

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2972886B1 (en) * 2011-03-17 2013-03-15 Thales Sa METHOD OF COMPRESSING / DECOMPRESSING PARTIALLY MASKED VIDEO FLOWS, ENCODER AND DECODER USING THE METHOD

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6505299B1 (en) * 1999-03-01 2003-01-07 Sharp Laboratories Of America, Inc. Digital image scrambling for image coding systems
US20040081333A1 (en) * 2002-10-23 2004-04-29 Grab Eric W. Method and system for securing compressed digital video
US20060188013A1 (en) * 2003-07-02 2006-08-24 Miguel Coimbra Optical flow estimation method
US20080117295A1 (en) * 2004-12-27 2008-05-22 Touradj Ebrahimi Efficient Scrambling Of Regions Of Interest In An Image Or Video To Preserve Privacy

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2879878B1 (en) * 2004-12-22 2007-05-25 Thales Sa COMPATIBLE SELECTIVE ENCRYPTION METHOD FOR VIDEO STREAM
CA2628203A1 (en) * 2005-11-04 2007-05-10 Emitall Surveillance S.A. Region-based transform domain video scrambling

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6505299B1 (en) * 1999-03-01 2003-01-07 Sharp Laboratories Of America, Inc. Digital image scrambling for image coding systems
US20040081333A1 (en) * 2002-10-23 2004-04-29 Grab Eric W. Method and system for securing compressed digital video
US20060188013A1 (en) * 2003-07-02 2006-08-24 Miguel Coimbra Optical flow estimation method
US20080117295A1 (en) * 2004-12-27 2008-05-22 Touradj Ebrahimi Efficient Scrambling Of Regions Of Interest In An Image Or Video To Preserve Privacy

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Li et al., A New Video Encryption Algorithm for H.264, 2005, IEEE. *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100057906A1 (en) * 2001-01-03 2010-03-04 Portauthority Technologies, Inc. Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks
US8271555B2 (en) * 2001-01-03 2012-09-18 Portauthority Technologies Inc. Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks
US9177120B2 (en) 2001-01-03 2015-11-03 Portauthority Technologies, Inc. Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks
US20160198207A1 (en) * 2013-07-22 2016-07-07 Sony Corporation Information processing apparatus and method
US10701425B2 (en) * 2013-07-22 2020-06-30 Sony Corporation Information processing apparatus and method
CN110460858A (en) * 2013-07-22 2019-11-15 索尼公司 Information processing unit and method
US11902261B2 (en) 2013-07-29 2024-02-13 Tivo Corporation Efficient common storage of partially encrypted content
US11546306B2 (en) * 2013-07-29 2023-01-03 Tivo Corporation Efficient common storage of partially encrypted content
US20190116163A1 (en) * 2013-07-29 2019-04-18 Mobitv, Inc. Efficient common storage of partially encrypted content
EP2874396A1 (en) * 2013-11-15 2015-05-20 Everseen Ltd. Method and system for securing a stream of data
US20160188980A1 (en) * 2014-12-30 2016-06-30 Morphotrust Usa, Llc Video Triggered Analyses
US10638142B2 (en) * 2015-04-30 2020-04-28 Hangzhou Hikvision Digital Technology Co., Ltd. Video coding and decoding methods and apparatus
KR102077239B1 (en) * 2015-07-02 2020-02-13 삼성전자주식회사 Method and apparatus for multimedia data encryption and decryption
EP3300373A4 (en) * 2015-07-02 2018-05-16 Samsung Electronics Co., Ltd. Method and device for encoding multimedia data, and method and device for decoding same
US10931645B2 (en) 2015-07-02 2021-02-23 Samsung Electronics Co., Ltd. Method and device for encoding multimedia data, and method and device for decoding same
KR20170004501A (en) * 2015-07-02 2017-01-11 삼성전자주식회사 Method and apparatus for multimedia data encryption and decryption
KR102410539B1 (en) * 2016-01-12 2022-06-16 한화테크윈 주식회사 Apparatus and method for encrypting privacy areas from compressed video
KR20220085760A (en) * 2016-01-12 2022-06-22 한화테크윈 주식회사 Apparatus and method for encrypting privacy areas from compressed video
KR20170084601A (en) * 2016-01-12 2017-07-20 한화테크윈 주식회사 Apparatus and method for encrypting privacy areas from compressed video
KR102575244B1 (en) 2016-01-12 2023-09-06 한화비전 주식회사 Apparatus and method for encrypting privacy areas from compressed video
US11115194B2 (en) * 2018-08-08 2021-09-07 Shandong University Of Science And Technology Gray image visual encryption method
US11159798B2 (en) * 2018-08-21 2021-10-26 International Business Machines Corporation Video compression using cognitive semantics object analysis
CN110446105A (en) * 2019-09-20 2019-11-12 网易(杭州)网络有限公司 Video-encryption, decryption method and device
CN114143410A (en) * 2021-11-16 2022-03-04 国网江苏省电力有限公司信息通信分公司 Power monitoring image encryption transmission method based on Internet of things

Also Published As

Publication number Publication date
FR2932046B1 (en) 2010-08-20
MX2010013317A (en) 2011-02-24
FR2932046A1 (en) 2009-12-04
EP2297951A1 (en) 2011-03-23
MA32377B1 (en) 2011-06-01
WO2009147183A1 (en) 2009-12-10
BRPI0913390A2 (en) 2015-11-24

Similar Documents

Publication Publication Date Title
US20110075842A1 (en) Method and System Making It Possible to Visually Encrypt the Mobile Objects Within A Compressed Video Stream
US8447034B2 (en) Method and system making it possible to protect after compression the confidentiality of the data of a video stream during its transmission
Carrillo et al. Compression independent reversible encryption for privacy in video surveillance
US20110158470A1 (en) Method and system for secure coding of arbitrarily shaped visual objects
EP2874396A1 (en) Method and system for securing a stream of data
US20110222603A1 (en) Method and System Making It Possible to Protect A Compressed Video Stream Against Errors Arising During a Transmission
Martin et al. Privacy protected surveillance using secure visual object coding
Paruchuri et al. Video data hiding for managing privacy information in surveillance systems
US8553995B2 (en) Method and device for embedding a binary sequence in a compressed video stream
CN113709523B (en) Method for encoding and decoding private data and image processing apparatus
Shanableh HEVC video encryption with high capacity message embedding by altering picture reference indices and motion vectors
Babel et al. Preserving data integrity of encoded medical images: the LAR compression framework
Favorskaya Watermarking models of video sequences
Eltayeb et al. Data embedding in scrambled video by rotating motion vectors
Gerhardt et al. Selective face encryption in H. 264 encoded videos
Esmaeilbeig et al. Compressed video watermarking for authentication and reconstruction of the audio part
Fujiyoshi et al. A scrambling method for motion JPEG videos enabling moving objects detection from scrambled videos
Choupani et al. Drift-free video coding for privacy protected video scrambling
Ruchaud et al. ASePPI, an adaptive scrambling enabling privacy protection and intelligibility in H. 264/AVC
Rohara et al. Using Codeword Substitution to Hide Data in Encrypted MPEG-4 Videos
Babel et al. WG1N5315-Response to Call for AIC evaluation methodologies and compression technologies for medical images: LAR Codec
Raghav et al. Security and Cryptography in Images and Video Using Elliptic Curve Cryptography (ECC)
Ridgway et al. Developing a Video Steganography Toolkit
Hamdi et al. Chaotic progressive access control for JPEG2000 images repositories
HUSSAIN et al. An Efficient Security Implementation for Privacy Information through Encrypted Data in Video Compressed Bit Streams

Legal Events

Date Code Title Description
AS Assignment

Owner name: THALES, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LE BARZ, CEDRIC;LENY, MARC;RENAN, ERWANN;REEL/FRAME:026211/0996

Effective date: 20110429

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION